Resources

Partners

Threat Remediation

Detect and Provide a Rapid Response to Advanced Security Threats

The 2018 “Cost of Data Breach” study (IBM/Ponemon Institute) indicated that the average time to identify a breach is 197 days, and the average time to remediate a breach is 69 days. The study also indicated that an average breach can cost your organization $3.86 million. However, when breaches take more than 30 days to be identified and remediated, the cost quickly escalates.

Despite your best preventive measures, data breaches are inevitable. To minimize the financial and operational impacts, your security teams need deep visibility into how your ERP data is being accessed. This heightened visibility helps organizations identify security gaps in order to avoid potential threats and accelerate remediation efforts if a breach has occurred

Key Challenges

Limited Logging

No Native Alerting Functionality

High Scope of Available PII

Lack of Integrated Analytics

Enterprise ERP (PeopleSoft and SAP) logs are not tracking user activity data to a granular level. The user activity data required to properly remediate a threat (ex. what data fields were accessed by a user and the location of access.

PeopleSoft logs cannot highlight or send out alerts regarding suspicious transactions, so security teams can take notice and act on them.

Your PeopleSoft applications contain PII on hundreds of pages, making them a luring target for hackers and therefore vulnerable to more security incidents.

For auditing and response purposes, manual analysis can only be done by exporting logs on excel sheets – this process can take weeks or even months to fully investigate a possible breach.

Key Features

Granular Logging

Appsian’s Application Security Platform offers comprehensive event logging that can be drilled down to page, component or even field level information. These logs record granular details on what data was accessed, where it was accessed from, associated user ids and IP address, and more.

Rapid Threat Response

Data is aggregated from the detailed access logs and visualized on engaging and visually rich dashboards. The dashboards are equipped with advanced segregation and deep drill-down capabilities that empower security teams to identify, investigate and rapidly respond to potential security threats.

Appsian is Trusted By

We did several assessments when PeopleSoft was selected and we decided to implement. We started looking at the product and what we had today in terms of security and we realized there were some gaps.– Matthew Scott, IT Director Penn State University

We did several assessments when PeopleSoft was selected and we decided to implement. We started looking at the product and what we had today in terms of security and we realized there were some gaps. – Matthew Scott, IT Director Penn State University